You are on page 1of 43

You are the system administrator of StarMoon Technologies.

The network of your organization includes 200 computers on a Windows 2003 based network. In your organization, 20 employees are deployed offshore for a project at London. These employees logon to the organization's network using dial-up connection. Recently, the CEO of your organization, Nancy Jones informs you that she has to attend a three-day conference in London. During her stay in London, she wants to access the organization's network remotely using her laptop. You need to assign her special privileges that are not available to other remote users deployed in London. How can you accomplish this task with least administrative effort and without disturbing the current network communication mechanism? You can assign static IP address to the laptop of the CEO and assign special privileges to that IP address. You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Virginia and Texas. The Virginia branch has 1100 hosts. However, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch is 1000 per second. The Texas branch has 2100 hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization? Two zones at the Virginia branch office and a separate DNS server for each zone. A single zone at the Texas branch office with one DNS server. You are the system administrator at BlueMoon Computers. The internal network of the organization contains a DNS server to process the queries of the client computers over the network. The employees using the DNS server complain about the slow processing speed of the DNS server. The DNS server of the network stores the entire project related data, the queries submitted to the server, and the results of the queries. The employees have to wait for a considerably long period to get the results of the queries they submit to the DNS server. This is delaying the projects they are working on and degrading their overall performance. What should you do to solve the problem? Configure DNS server as Caching-only server so that it stores only the results of the queries. Which database file is used by the DHCP database as a swap file during database maintenance? Tmp.edb You are the system administrator at Blue Moon Inc. The company network consists of 500 computers. All the computers are running on Windows Server 2003. James is using a client computer on the network. He wants to access the files available on the server. The server has an IP address 192.168.0.45. James complains that he is not able to access the server computer. You decide to examine the ARP cache on James' computer. You notice that the MAC entry corresponding to 1 92.1 68.0.45 address in ARP cache does not match with the MAC address of the server computer. How will you fix the problem?

Identify the MAC address of the server using arp -a command, and then, modify the ARP cache by adding correct MAC address into the ARP cache as a static entry. John is the system administrator at Global Software, Inc. The company is having remote network access between the computers of the branch office and the head office. John needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should John use to monitor the performance of all remote access ports? RA Total Blueperl, Inc has its head office at Texas City and two branch offices at Denver and New York. All the offices of the organization have implemented NLB clusters. All the NLB clusters are accessible across the organization's network. You, as a system administrator have been assigned the task to add a node in a cluster at the Denver branch and check the performance of the cluster. Which of the following options will enable you to accomplish this task? Network Load Balancing Manager The WAN interfaces in______________router can be configured depending on the number of locations to be connected. 3600 series modular router Which RRAS feature in Windows Server 2003 supports routing, where one computer sends packets addressed for the entire network? Multicast routing You are the system administrator at BlueMoon Computers. All the computers in the company are connected using an internal network. The employees working on a single project need to communicate with each other by exchanging messages and required information. The employees complain that the information they send is not routed to the correct computers. Which layer of the OSI model should be checked to resolve the problem? Network An organization has its head office at Denver and two branch offices at Virginia and New York. Each branch including the head offices has implemented NLB clusters. You, as a system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task? Nlb.exe

You are the system administrator at BlueMoon Computers. The internal network connecting all the computers of the company contains a DHCP server. You implement synchronous backup method to take the backup of the data automatically. All the data related to the projects going on in the company are maintained by the DHCP server and stored in the company database. The hard drive on which the DHCP server was configured crashes due to a hardware failure. All the data on the hard drive is lost. The data is very important for the progress of the projects. What should you do to minimize the data loss? Check the dhcp.mdb file to find out the various transactions in the DHCP database transactions. You are the system administrator in Texas Computers, Inc., with its head office at Texas. The total number of hosts at the head office is 50. The organization now plans to open a branch office at New York that will have 100 hosts. The branch office at New York will be a separate subnet but will be connected to the organization's network at Texas, through VPN. You need to plan the TCP/IP addressing structure for the new branch office according to the current infrastructure of the organization. Identify the most appropriate addressing structure for the new branch office. Classless-based, class C addressing structure You are the system administrator at Red Sky Inc. The organization has a network of Windows Server 2003 computers. You are asked to implement a routing protocol that allows a router to keep track of all the devices on the network. The router should acknowledge any changes occurring in the network configuration when a device goes off the network. Which routing protocol will you suggest to accomplish this? Open Shortest Path First (OSPF) Under which condition can a DNS Zone allow only secure dynamic updates? Zone is configured as an Active Directory-integrated zone. Statement A: DNS host records registration problem may occur when the primary DNS suffix and the zone name is not the same. Statement B: DNS dynamic update problem occurs when a DNS client is using a third party DNS product that does not support dynamic updates. Which of the following is correct about the above statements? Both, Statement A and Statement B are True. You are the system administrator at BlueMoon Computers. Red Sky is another company working in partnership with BlueMoon Computers. Both companies are working on a joint project. Companies need to access the data from each other's database during project development. To secure the data access procedure, both companies use secret shared key for each data access session. The secret key is used to encrypt and decrypt

the data over the network. Database administrator in your company informs you that an unauthorized access is made to the database. How will you verify the unauthorized access? Examine the Audit log and verify all the Internet Key Exchange events in the log to identify an unauthorized access. Which predefined IPSec policy ensures secure communication with only IPSec enabled devices? Server The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices? Distributed Statement A: A forwarder resolves the names that the DNS servers forward to it. Statement B: A forwarder redirects the queries to the root server of the external network to resolve the queries. Which of the following is true with respect to the above statements? Statement A is False and Statement B is True.

Statement A: The host name of a computer is displayed using Hostname utility. Statement B: The NetBIOS name of a computer need not be unique. Statement A is True and Statement B is False. You are the system administrator of Skyline, Inc., a leading telecom organization with its head office located at New York. There is a setup of 200 computers In the network. All computers are running on Windows Server 2003 operating system. You want to apply circuit-level filtering to protect the network from outside attack. In addition, you want to ensure fast and secure access to the Internet. Which of the following options will enable you to accomplish this task? ISA

StarMoon Technologies has its head office at Boston. The network of the head office consists of 200 computers running Windows Server 2003. The branch office of the organization is located at Texas City. The network ofthe branch office consists of 100 computers running Windows NT computers. The head office and the branch office are connected through slow WAN links. Select the best-suited name resolution strategy for resolving host names for the organization. Plan for one DNS server at the head office and one WINS server at the branch office. You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. You want to configure a computer to work both as a Web server named www.admin.bmcompltd.com and a FTP server named ftp.accounts.bmcompltd.com. The current host name of the computer Is compl .admln.bmcompltd.com. You need to configure this computer using CNAME resource records. What are the various CNAME entries you need to make In the admin.bmcompltd.com zone to accomplish this task? compl IN A 10.0.0.31 WWW IN CNAME compl ftp IN CNAME compl James Is the system administrator at Safest Software Co. James Is monitoring the network, which includes tracking and troubleshooting network problems. Which utility should he use to test the network connectivity and configuration of TCP/IP settings of a remote computer? Ping utility

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The Internal network of the company Is divided Into various zones. The database administrator of the company complains about not being able to send mails and communicate with other computers over the network. To resolve the problem, you need to know the host names of the computers and the ports assigned to provide a particular service. Which resource record should you view to get the desired Information? Service Record (SRV) You are the system administrator at BlueMoon Computers, You are reviewing the network traffic and notice that there are a large number of DNS queries for resolving the host name of the File server In the network. You also find that the network services are becoming slow because of the DNS queries and irrelevant network traffic for the File server. You decide to configure the entry of the File server In the Hosts file on each computer. The Hosts file will be preloaded In the client resolver cache. You also plan to add name-to-IP address mapping to the Lmhosts file so that the NetBIOS names In the organization can be resolved. What Is the correct sequence of steps you should take to accomplish this task? View and flush client resolver cache. Preload the client resolver cache. View and release NetBIOS name cache. You are the system administrator at Supersoft2000. You configure the DHCP scopes. Which DHCP scope property you should configure to set the range of valid IP addresses? Network IP address range You are the system administrator of Infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command Is unsuccessful. Which of the following could be a cause of this problem? The DNS server service is not started.

You are a system administrator at Blue Sky Inc. You decide to use IAS to centrally manage remote access to company's network. You maintain a centralized database of all user profiles that can be accessed by other remote access servers on the network. The company decides to expand Its network to various cities, adding 5000 workstations to the network. How will you Justify that IAS Is suitable for the new network configuration? IAS allows scalability of the network. Check the WINS database for consistency. Backup and restore a WINS database. Compact a WINS database. Scavenge a WINS database. Check the WINS database for consistency. You are a system administrator at WorldAd, Inc. The company has recently started its offshore branch offices In different countries. All the branch offices need to have a direct secure link with the server running on Windows Server 2003 located at head office In Denver. To keep networking costs minimal, the company decides to use public network Instead of leased lines to connect different offices. All the offices need to use the Virtual Private Network (VPN) connection with the head office. The VPN will ensure user authentication and data security using encryption during transmission. You are asked to enable Routing and Remotes Access service on the server so that the VPN connection can be configured. What prerequisite Information will you require before configuring a VPN server for VPN connection? Identify the interfaces that connect to the Internet and the private network of the company. Identify whether the remote client is assigned IP addresses by a DHCP server or by a VPN server. Identify whether the VPN connection Is authenticated by a RADIUS server or by a VPN server. You are the system administrator at Red Sky Inc. The company has a medium-sized network, which has systems running Windows Server 2003. The network has various subnetworks and data transmission between the client computers on the subnetworks takes place through routers. Users using the client computers complain about the long transmission delay for data packets. You analyze the network settings and find that sometimes the data packets enter a loop and are not able to reach the destination computer. Which methodology will you Implement to solve the problem? Configure the network router and implementing Routing Information Protocol (RIP).

You are the system administrator in Denver Prime, Inc. The organization has a Windows Server 2003 based network of 400 computers. In addition, there Is a Windows Server 2003 computer, which serves as a DNS as well as an internet server. Recently, you have noticed that the DNS server takes a long time In resolving host names. As a result, you plan to move the DNS server service to a computer with higher configuration. However, you find that this will make the DNS server unavailable for at least two days. This will result In loss of time and effort. So, you plan to optimize the performance of the DNS server. As a first step towards optimizing the performance of the DNS server, you plan to restrict the internet clients from using the DNS server for resolving other domain names on the Internet. Which of the following options will enable you to accomplish this task? Disable recursion on the DNS server

Statement A: Filter specifies the type of action that needs to be performed on a particular type of network traffic. Statement B: Filter action specifies the type of network traffic to which a particular action is applied. Both Statement A and Statement B are False. You are the system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use DHCP service to assign IP addresses dynamically. You now want to display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to Implement the required task? Lease Obtained You are the system administrator of StarMoon Technologies. The head office of your organization Is located at Boston. The organization has opened two branches In Paris and London. You have been assigned the task of planning the network Infrastructure for the new branches. After analysing the network requirements, you have Implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using IP, IPX/SPX, RIP, orOSPF protocol. Depending on the requirements, which intermediate device would you recommend for the network? Router

You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IPSec Is deployed for secure data transmission/Your Junior system administrator. James Informs you that while connecting to one of the computers, ComputerOl, an error message, ""Invalid authentication protocol" is displayed. You check the IPSec policies configured on James computer, and find that the IPSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem? Security Configuration and Analysis MMC snap-in You are the system administrator at Red Sky Inc. The company has a dedicated network of 2000 computers running Windows Server 2003 to control product sales and distribution at various sales offices. The network is not connected to the internet. A DHCP server on the network dynamically assigns IP address to all the computers. Power failure shuts down the DHCP server and it Is not available on the network. New client computers are not able to connect to the network because DHCP server has failed. You are asked to device some solution so the network does not fail in future even after DHCP server goes down. What solution will you suggest for the problem? Implement alternate IP addressing scheme on the network configuring Automatic Private IP Addressing on each computer. The head office of your organization Is located at New York. The organization now plans to open a new branch office at Las Vegas, which will be connected to the head office through WAN links. The new branch office is located In a building with three floors and will accommodate approximately 1000 hosts. Out of these 1000 hosts, 400 hosts belong to the operational department and the remaining 600 hosts belong to the administration department. The network of this branch office will consist of computers running Windows Server 2003 and Windows 2000 operating systems. As the system administrator, you need to create a TCP/IP plan for the new branch office. Identify the most appropriate plan for the new branch office. You can use classless-based, class B addressing structure. In addition, you can have two subnets for the new branch office. You have joined as a system administrator in PQR Corp. The head office of your organization is located at Chicago and three branch offices are located at Denver, Texas, and California. The network of the head office consists of 100 computers, which are logically divided in three subnets. There is one computer running Windows Server 2003 that is configured as a domain controller. The head office network is connected to the branch office networks by slow WAN links. Computers in the head office and branch offices have been assigned IP addresses manually. You plan to reduce the administrative burden of managing IP addresses manually. Which of the following options will enable you to accomplish this task?

Implement mixed DHCP infrastructure in the organization.

Alpha Communications, Inc. is a leading advertising and media organization located at Boston. The head office of the organization has a setup of 75 computers. The network setup is in a mixed mode that consists of Windows 2000, Windows 98, and Windows Server 2003 operating systems. The organization has opened a new branch office at New York. The branch office has a setup of 50 computers and has a routed environment. The branch office network is a VLAN for the main organization's network. You have just joined as a system administrator in this branch and you have been assigned the task to plan for a host name resolution method, which of the following name resolution methods would be most appropriate for the branch? Automatic name resolution

You are the system administrator at BlueMoon Computers. The computers of the company are interconnected using an internal network. The employees of various departments of the company communicate with each other using the network. The employees also access the server to get the required information related to their respective projects. The employees complain that during their sessions they get disconnected from the server, which results in loss of data. They also complain that sometimes they are not able to connect to other applications over the network. Which layer of the OSI model should be checked to resolve the problem? Session You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. The data zone located on the primary zone changes. The change in the data zone should be updated in the secondary DNS servers also. You need to make the necessary updates to the secondary DNS servers. Which server should you look for the list of servers to be notified? Primary Server

Reprotek, inc. has its head office at Denver. The organization has opened a new branch office at Boston. The head office supports the Ethernet LAN network where as the branch office supports token ring network. You have created two broadcast domains. One broadcast domain consists of the head office whereas the other broadcast domain consists of the new branch office. You have been assigned the task to select an appropriate intermediate device so that the data is transmitted using a specific protocol. Which of the following devices is best suited in this situation? Layer 3 switch Your organization has acquired a new business contract and has assigned a team of five employees to work on this contract. As this team works on confidential data, you do not want Internet-name resolution for this team. You have installed a new DNS server for this team, in addition, you do not want any client queries to be forwarded to this new DNS server. You also do not want other employees of the organization to use this DNS server internal name resolution. Which of the following options enables you to accomplish this task? Delete root hints file on DNS server. You are the system administrator at BlueMoon Computers. The internal network of the company connects all the computers in the company. A remote client broadcasts the NetBIOS name query packet to internal network interface to connect to a computer over the network. The broadcast is unable to resolve the name of the computer. You need to preload the NetBIOS name cache using the Lmhosts file to allow it to resolve NetBIOS names. To preload the NetBIOS name cache using Lmhosts file, you need to perform the following steps: Open the Run dialog box and type notepad %systemroot%system32\drivers\etc\lmhosts.sam in the Open combo box. insert the required information in discrete lines of Lmhosts file for preloading the content in the NetBIOS name cache. Click the OK button to open the Lmhosts file for editing in Notepad. Select the All Files option from the Save as type list box and type "lmhosts" to save the file without an extension. Select the Save As option from the File menu to open the Save As dialog box. Click the Save button to complete the preloading process and close the Notepad. 1,3,2,5,4,6

An organization has its head office at Denver and two branch offices at Virginia and New York- Each branch including the head offices has implemented NLB clusters. You, as a system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task? Nlb.exe You are the system administrator at Red Sky Corp. The company has a large network consisting of many subnetworks containing systems running Windows Server 2003. The subnetworks are used by the branch offices, which send latest production information to the head office. The company has decided to start a new branch office in New Jersey. You are asked to connect the subnetwork in the branch office with the main network so that the latest production information can be delivered to the head office. How will you configure the connection? Configure network routing by configuring RRAS, adding a routing protocol, and adding a routing interface. Statement A: Filter specifies the type of action that needs to be performed on a particular type of network traffic. Statement B: Filter action specifies the type of network traffic to which a particular action is applied. Both Statement A and Statement B are False. You are the system administrator at BlueMoon Computers. The company has various branches at different places. The various branches are interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition? Renewal interval James is the system administrator at Smart Software Development. The company is having remote network access between the computers of branch office and head office. James needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should James use to monitor the performance of individual remote access ports? RAS Port You are the system administrator at Red Sky IT Systems. You configure the DHCP reservation. Which element of DHCP reservation should you configure for the value that identifies a particular reservation? Reservation name

You are the system administrator of Best Sportswear, inc. The head office of the organization is in Washington DC. The organization now plans to set up a new customer care outlet in the same city. This outlet will have 1 5 computers running Windows Server 2003 and Windows 2000 operating systems. The network of the customer care outlet will not be an independent network and it will be connected to the network of the head office using slow WAN links. One computer will be the FTP server that will be used by the employees of the customer care outlet to communicate with the head office. The FTP server will have a static IP address. As a system administrator, you need to create the best suited TCP.'IP plan for the customer care outlet as per the existing infrastructure and the requirements of the organization, identify the most azpropriate plan. You can use class-based, class C addressing structure, in addition, you can use manual addressing for allocating the IP addresses to the hosts of the customer care outlet.

You are the system administrator of Dreamz, inc, an organization that creates multimedia graphics. The head office of your organization is located at Denver. The management of your organization plans to open a branch office at Melbourne. You have been assigned the task of planning the network infrastructure for the new branch office at Melbourne considering that heavy multimedia files would be transferred on the network. The organization's network has high configuration computers. Identify the network access connection method that is most appropriate for the branch office. Statement A: The NS resource record appears in the forward lookup zones. Statement B: The NS resource record appears in the reverse lookup zones. Both Statement A and Statement B are True.

You are the system administrator of BtueMoon Computers. The network in your organization is based on Windows Server 2003. There is one DNS server service installed on a Windows Server 2003 computer. The client computers in your domain are Windows NT 3.5x, Windows 2000, and Windows 2003. The users of Windows 2003 complain about being unable to access the shared resources on Windows NT server over the network. They need to access the Windows NT server to get some important information related to their project. Why are the employees unable to get their data from the Windows NT server? The DHCP server does not have the Enable Updates for DNS Clients That Do Not Support Dynamic Update check box selected. You are the system administrator at BlueMoon Computers. The internal network of the company has a DHCP server to manage all the DHCP clients. You go for an important meeting. While you attend the meeting, the assistant system administrator looks after the network activities. When you come back, the assistant system administrator informs you that many employees are unable to access the network. He also informs that some employees complained about the IP conflict problem they are facing when they want to communicate with other computers. What should you do to find out what went wrong while you were not present? Check the J50.log file to find out the various transactions in the DHCP database transactions. You are the system administrator of StarMoon Technologies. The head office of the organization is located at Boston. Your organization has opened two branches in Paris and London. You have been assigned the task of planning the network infrastructure for the new branches. After analysing the network requirements, you have implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using the IPX protocol only. Depending on the requirements, which intermediate device would you recommend for the network considering that the management wants you to implement the most inexpensive device? Layer 3 switch You are the system administrator at Red Sky inc. The company has a dedicated network of 2000 computers running Windows Server 2003 to control product sales and distribution at various sales offices. The network is not connected to the Internet. A DHCP server on the network dynamically assigns IP address to all the computers. Power failure shuts down the DHCP server and it is not available on the network. New client computers are not able to connect to the network because DHCP server has failed. You are asked to device some solution so the network does not fail in future even after DHCP server goes down. What solution will you suggest for the problem? Implement alternate IP addressing scheme on the network configuring Automatic Private IP Addressing on each computer.

You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company wants to send and receive mails from the clients of the company. You want to find out whether a SMTP e-mail server is present on the network. Which resource record should you view to get the desired information? Mail Exchange (MX) The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices? Distributed Consider the following statements: Statement A: A NetBIOS computer with name Computer! [OOh] provides workstation services. Statement B: A NetBIOS computer with name Computer2 [03h] provides messenger services. Both Statement A and Statement B are True. You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IPSec is deployed for secure data transmission. Your junior system administrator, James informs you that while connecting to one of the computers, ComputerOl, an error message, "Invalid authentication protocol" is displayed. You check the IPSec policies configured on James computer, and find that the IPSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem? CPO Editor Security Configuration and Analysis MMC snap-in IP Security Monitor RSoP troubleshooting tool

Which route stored in a routing table is the route to a specific host on the network or contains a broadcast address?

Default route Host route Network route Network mask Janes Technologies has a setup of 80 computers. This organization uses an SQL database that is hosted on two computers in the network. The SQL server database is required round-the-clock because most of the data updates occur after office hours. The organization has recently recruited 40 employees who will be using the SQL server database. As a system administrator, you need to plan the availability of this database for all the 120 employees considering the fact that you also need to ensure consistency of the data stored in the database. Which of the following types of clusters is best suited for meeting these requirements? Create an NLB quorum cluster Create a server cluster Create a server quorum cluster Create an NLB cluster Which of the following is an invalid character according to the DNS naming standards ? Alphabet Hyphen Number Underscore You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems, which utility should you use to troubleshoot TCP/IP problems? Address resolution utilities Network Diagnostics utility Netsh command Network Connections Repair Link You are the system administrator at Modern Research inc. The company is a research organization that manages a community of research scientists from various universities

across the globe. The company has its head office in Atlanta and all the scientists working on a project submit their thesis at the head office for publishing. The scientist at the remote location needs to establish a connection with the Windows Server 2003 server in head office using dial-up. The connection should be physical, non-permanent, and secure so that a malicious user cannot trap the transmitted data. You are asked to configure the Routing and Remote Access on the server so that the scientists can communicate with the server in a secure manner using dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up? identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access. Which of the following options is a storage method for networks that use SCSI parallel bus to connect multiple storage devices in a network? LUN masking

Which predefined ipsec policy ensure communication with only ipsec enable devices? Server You are the system administrator of infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command is unsuccessful. The DNS server service is not started. You are a system administrator at WOrldAd, Inc. The company has 150 employees. All the employees are authorized to access sensitive data files available on company servers. You want to ensure that only authenticated users can access the data files using PAP, CHAP, and MS-CHAP protocols. Users authenticated with the authentication protocols should be allowed to establish remote connection, which parameter of the policy profile should be configured to meet the requirements? Authentication John is the system administrator at Technology Systems. The company has one DHCP server and 300 clients. John is responsible for assigning IP addresses to all the client computers. He uses DHCP service to assign IP addresses dynamically. He now wants to display the IP address of the DHCP server that responds to the DHCP request. Which field containing the DHCP settings should John use to implement the required task? DHCP Server

Consider the following statements: Statement A: You should disable the local subnet prioritization method when the servers having multiple IP addresses are not on the same subnet. Statement B: You should disable the round-robin rotation method when the servers having multiple IP addresses are on the same network. Both, Statement A and Statement B are False. You are the system administrator at Red Sky inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server, in addition you should monitor the routing activities taking place during data transfer. How will you meet the requirements? Configure the network server to allow Routing and Remote Access Service. You are the system administrator at Blue Moon Inc. The company network consists of 500 computers. All the computers are running on Windows Server 2003. James is using a client computer on the network. He wants to access the files available on the server. The server has an IP address 192.168.0.45. James complains that he is not able to access the server computer. You decide to examine the ARP cache on James' computer. You notice that the MAC entry corresponding to 192.168.0.45 address in ARP cache does not match with the MAC address of the server computer. How will you fix the problem? Identify the MAC address of the server using arp -a command, and then, modify the ARP cache by adding correct MAC address into the ARP cache as a static entry. You are the system administrator in Texas Computers, Inc., with its head office at Texas. The total number of hosts at the head office is 50. The organization now plans to open a branch office at New York that will have 100 hosts. The branch office at New York will be a separate subnet but will be connected to the organization's network at Texas, through VPN. You need to plan the TCP/IP addressing structure for the new branch office according to the current infrastructure of the organization, identify the most appropriate addressing structure for the new branch office. Classless-based, class C addressing structure

You are the system administrator of Red Sky Corp. The domain in the company network has two Windows Server 2003 member server computers named Server 1 and Server 2. Routing and Remote Access Service is enabled for remote access on Server 2. IAS is installed on Server 1. Server 2 uses Server 1 to authenticate remote access credentials. The remote access policies on Server 1 specify that domain members are allowed remote access to the network. However, users report that they are not allowed to dial in to Server 2. You need to identify the cause of the problem and suggest a solution to resolve the problem. How will you accomplish the task? Server 1 is configured to support only local user accounts. Add Server 1 to the RAS and IAS Servers group in Active Directory to resolve the problem. Which event ID in the DHCP server audit log specifies an event when a client renews a lease ? 11

Consider the following statements: Statement A: The NS resource record appears In the forward lookup zones. Statement B: The NS. resource record appears in the reverse lookup zones. Both Statement A and Statement B areTrue:

Which RRAS feature in Windows Server 2003 supports routing, where one computer sends packets addressed for the entire network? Multicast routing

Which of the following functions Is performed by IPSec? Authenticates client computers Involved in communication

You have joined Texas Computers, Inc. as a system administrator. You have been asked to plan the network Infrastructure for the two new branch offices of the organization. You have to collect and record the Information about the various teams that will be implementing the network infrastructure. You also need to determine the tools and strategies that will be used for implementing the network Infrastructure for the new branch offices. In addition, you need to Identify contingencies and unforeseen problems during the Implementation of the network Infrastructure and determine ways to deal with such problems. Identify the plans In which you will record this Information. Communication plan, deployment plan, and support plan You are the system administrator at Blue Moon Computers. The Internal network of the company consists of a DHCP server and various DHCP clients. The company has undertaken many new projects. The team members of the new projects are located at different places and need to communicate with each other over the internal network of the company. The employees of the company complain that they are unable to get the services from the server. The employees also complain that they have to wait far a considerably long time to download the files from the network to their computers. Sometimes, the request for a file or network resource Is timed out and is rejected by the server. The employees need to transfer files to each other to perform their project work. What should you do to let the employees complete their projects In time? Use the DHCP statistic, Requests, to find out how many DHCPREQUEST packets are received from each client. This will help you to know who Is trying to overload the network with unnecessary service requests. You are the system administrator in Janes Technologies. Your organization has opened two remotely located branch offices at Vi rgl ni a and Texas. The Vi rgi ni a branch has 1100 hosts. H owever, out of these 1100 hosts, 500 hosts do not require Internet access. The expected number of client queries for the branch Is 1000 per second. The Texas branch has 21OG hosts. The expected number of client queries for the branch is 1900 per second. You need to plan the number of zones and DNS servers for each branch. Which of the following options would you recommend for your organization? Two zones at the Virginia branch office and a separate DNS server for each zone. A single zone at the Texas branch office with one DNS server The head office of Matrix, Inc. Is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers In these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP Infrastructure strategy you will plan for the new branch offices? Distributed Which event ID In the DHCP audit log file specifies an event when an IP address Is Issued to a client? 10

You are the system administrator at Global Software, Inc. The company has one DHCP server and 300 clients. You are responsible for assigning IP addresses to all the client computers. You use DHCP service to assign IP addresses dynamically. You now want to display the date when the server was assigned a dynamic IP address using DHCP. Which field containing the DHCP settings should you use to Implement the required task? Lease Obtained Origin Communications, Inc. Is a leading ISP provider that has Its head office located at London. This organization has 10 branches In different parts of USA. At the head office, a 3600 modular router Is placed and at each branch office 2500 series routers are placed for transmitting the data packets. The organization has opened 16 new branches in different parts of the world. You as a system administrator have been assigned the task to select an appropriate routing protocol for the new branch offices. Which of the following routing protocols will be best suited for the new branch offices? ospf You are the system administrator of Infolog, Inc. that has a setup of 50 computers. All the clients use the DNS server for name resolution. Recently, the user of one of the client computers has complained that the DNS server has failed to respond to a name resolution query. You try to ping the DNS server but the ping command Is unsuccessful. Which of the following could be a cause of this problem? The DNS server service is not started. StarMoon Technologies has its head office at Boston. The network of the head office consists of 200 computers running Windows Server 2003. The branch office of the organization is located at Texas City. The network ofthe branch office consists of 100 computers running Windows NT computers. The head office and the branch office are connected through slow WAN links. Select the best-suited name resolution strategy for resolving host names for the organization. Plan for one DNS server at the head office and one WINS server at the branch office. You are a System administrator at Red Sky Corp. You are asked to Implement a security policy on the company network. You Implement the security policy configuring MSCHAP authentication on RRAS. John Is an employee In the company and has remote access rights as specified In the access policies for the network. You need to modify the parameters In the policy profile so that a user cannot change the account password Configure Authentication parameter. You are the system administrator at BlueMOon Computers, The internal network of the company contains a DNS server. Whenever the DNS database Is changed or updated, you need to manually update the changes. The size of the DNS database Is large. Therefore, you want to automate the system of updating the DNS database. The DNS database contains confidential data related to the projects going on In the company, and

therefore, data must be secure. What should you do to reduce your burden of updating the database and keep the security of the DNS database? CCreate a new zone with Allow only secure dynamic updates option selected.

Consider the following statements: Statement A: Filter specifies the type of action that needs to be performed on a particular type of network traffic. Statement B: Filter action specifies the type of network traffic to which a particular action is applied. Both Statement A and Statement B are False. Consider the following statements: Statement A: A host name of a computer contains a maximum of 255 characters. Statement B: ANetBIOS name consists of amaximum ofl5 characters. Which of the following Is true with respect to the above statements? Both Statement A and Statement B are True. You are working as the system administrator at WorkWithTerminals. The organization provides network solutions to the client organizations. A client organization want to connect its subnetworks. It wants to Install a router for each link, which will route the network traffic from source to destination. The router should dynamically collect the routing Information and the routing table should also be updated from time to time. What kind of routing solution would you suggest to the organization? Connect the subnetworks using a router that implements Routing Information Protocol (RIP). You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application Is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options Is the best possible strategy to accomplish this task? Create a server cluster that is based on single quorum device cluster model. You are the system administrator at BlueMOon Computers, The internal network of the company contains a primary DNS server and various secondary DNS servers. The Internal network of the company is divided Into various zones. The managing director of the company wants you to give him a list of all the zones of the network and the e-mail address of the administrator of that zone. Which resource record should you view to get the required Information? Start Of Authority (SOA)

You are the system administrator at Red Sky Inc. the company's network consists of 500 systems with Windows Server 2003 servers. An authorized remote user can access the shared files available on servers. You are asked to keep track of network access activities using routing and remote access logging characteristics provided by RRAS. In addition, you are asked to perform the following activities: Maintain a detailed record of all remote access requests. Log names of remote access policies for all the connection attempts. You want to use the Information available In the above logs for Judicial enforcement of remote access policies. How will you meet the requirements? Configure the server to allow Local Authentication and Account logging. You are the system administrator at WorldAd, Inc. The network has 50 computers, which are Installed in an office. All the computers are running Windows Sever 2003 and configured to use NetBIOS naming function. The computers are configured as B-type nodes of NetBT protocol and use WINS IP addresses. The company decides to scale up the network to contain 5000 computers. After expansion of the network size all the employees complain about degraded network bandwidth. How will you fix the problem? Configure networks computers as P-node types and use a NetBIOS Name Server (NBNS) for naming function. You are the system administrator at Red Sky Inc. All the computers on the network are running Windows Server 2003. The network has a DNS server to resolve host names with IP addresses. The DNS server provides DHCP services and assigns IP addresses dynamically to the client computers. Client computers on the network access the Internet through a proxy server with an IP address 192.168.0.254. The configuration of DHCP server is changed according to the requirements of a new project. Employees complain to you that they are unable to access the Internet. Employees need to access the Internet to complete their project in scheduled time. What will you do to resolve the problem? Permanently lease an IP address to the proxy server and specify this setting in DHCP server.

You are the system administrator at WorldAd, Inc. The company has a large network of Windows Server 2003 computers. The employees of the company use the internal network to communicate and transfer the data related to their projects. The internal network of the company Is divided Into various subnetworks. Multiple routers are used to connect the various subnetworks with each other. The routers are configured such that they discard the data packets If the network traffic or hop counts for a data packet increase more than the threshold value. The employees from the various subnetworks complain to you that the time taken In transferring the data from one subnetwork to the other is more than expected during the office working hours. The employees also complain that sometimes the data is not all transferred from one sub network to another. What should you do to solve the problem?

Use Open Shortest Path First (OSPF) for routing the data packets You are the system administrator in Red Sky IT Systems. The head office of your organization is located at Denver. The network of the organization consists of 100 computers on the redsky.com domain. In the head office, IFSec Is deployed for secure data transmission. Your Junior system administrator. James Informs you that while connecting to one of the computers, ComputerOl, an error message, ""Invalid authentication protocol" is displayed. You check the IFSec policies configured on James computer, and find that the IFSec policies are correctly configured. When you try to connect to ComputerOl, you also receive the same error message. Which of the following tools will enable you to resolve this problem? Security Configuration and Analysis MMCsnap-in How many generic domains are present in the domain name space ? Seven You are the system administrator at BlueMOon Computers, The company has various branches at different places. The various branches are Interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition? Renewal interval You are the system adm i ni strator at Sm artsoft2000. Al I the com puters In the company are running Windows Server 2003 as their operating system. You have Installed and configured network access services on the computers of accounts department. Same of the users of accounts department start complaining about connection failure and slow connection speed. Which utility should you use to resolve these problems? System Monitor and Performance Logs and Alerts Consider the following statements: Statement A: The caching-only servers are non-authoritative servers that contain Information regarding frequently requested domain names and IP addresses associated with each domain name. Statement B: The information contained in the caching-only server is used only to quickly answer queries from other DNS servers. Statement A is True and Statement B is False.

James Is the system administrator at Safest Software Co. James Is monitoring the network, which includes tracking and troubleshooting network problems. Which utility should he use to test the network connectivity and configuration of TCP/IP settings of a remote computer? Ping utility You are the system administrator at BlueMOon Computers, You have established the internal network of the company, which connects all the computers. You assign host names and NetBIOS names to the computers on the network. Different applications run on different computers. An application running on a computer needs to communicate with another computer on the network to request for some information. The application sends a host name to the DNS client sen/Ice. The following steps are performed: DNS server sends the request to the NetBIOS name resolution process. DNS client service seeks the required host name in the client resolver cache. DNS client sen/ice seeks the host name query to the DNS server. The corresponding IP address Is returned to the application on success. What Is the correct sequence of steps that is followed when the DNS client service resolves the host name to the corresponding IP address? 2,3,1,4 You are the system administrator at Red Sky IT Systems. You configure the DHCP reservation. Which element of DHCP reservation should you configure for the value that identifies a particular reservation? MAC address Reservation name Description IP address You are the system administrator in StarMoon Technologies. The organization has its head office at Florida and branch office at Los Angeles. Everyday, important information, such as daily sales report and customer records are sent from the branch office to the head office using a dial-up connection. You want to ensure that the data that is being transmitted using the dial-up connection is secure from unauthorized access. Which of the following options will enable you to accomplish this with least administrative effort? Implement IPSec policies.

You are the system administrator at Blue Moon Computers. The internal network of the company consists of a DHCP server and various DHCP clients. The company has undertaken many new projects. The team members of the new projects are located at different places and need to communicate with each other over the internal network of the company. The employees of the company complain that they are unable to get the services from the server. The employees also complain that they have to wait for a considerably long time to download the files from the network to their computers. Use the DHCP statistic, Requests, to find out how many DHCPREQUEST packets are received from each client. This will help you to know who is trying to overload the network with unnecessary service requests. The head office of Janes Technologies is located at New York. This office has a setup of 1000 computers running Windows Server 2003. One computer is running as a DNS server to resolve the names for the domain, janestechnologies.com. The branch office of this organization is located at London. The head office is connected with the branch office using slow WAN links. The users from the branch office send name resolution queries to the head office. You as a system administrator need to select an appropriate strategy to reduce the load on the DNS server at the head office. Which of the following options will be the most appropriate strategy for this situation? Disable recursion on the DNS server at the head office and place one DNS server at the branch office. You are the system administrator in Best Computers, Inc., with its head office at New York. The organization has 15 branches across USA, with total number of employees being 8000. The organization now plans to open up 4 new branch offices in Europe with each branch office having 1000-1200 hosts, in addition, each new branch office will be a separate network that will be connected to the main organization's network through VPN and leased lines. As a system administrator, you need to plan the TCP IP addressing structure for the new branch offices according to the current infrastructure of the organization, identify the most appropriate addressing structure for the new branch offices. Class-based, class A addressing structure

You are the system administrator at BlueMoon Computers. The internal network of the company connects all the computers. Most of the computers in the network are Windows 95 and Windows 98 computers. An application running on a computer needs to get some data from another computer over the network. The application sends a request to resolve the NetBIOS name of the corresponding computer. Where does the application send the request at first during the NetBIOS name resolution? NetBIOS cache Statement A: A host name of a computer contains a maximum of 255 characters.

Statement B: A NetBIOS name consists of a maximum of 15 characters. Which of the following is true with respect to the above statements? Both Statement A and Statement B are True. You are the system administrator at BlueMoon Computers. The company has various branches at different places. The various branches are interconnected using an internal network. You configure the NetBIOS name resolution service on the internal network of the company by configuring a Windows Server 2003 computer as a WINS server. The WINS database becomes overcrowded because of the presence of all those registered WINS client names that are no longer used. You want to ensure that only those WINS client names remain active that are explicitly renewed within 3 days of their creation. Which scavenging parameter should you set to ensure this condition? Renewal interval The WAN Interfaces In______________router can be configured depending on the number of locations to be connected. 3600 series modular router

You are the system administrator at Modern Research inc. The company is a research organization that manages a community of research scientists from various universities across the globe. The company has its head office in Atlanta and all the scientists working on a project submit their thesis at the head office for publishing. The scientist at the remote location needs to establish a connection with the Windows Server 2003 server in head office using dial-up. The connection should be physical, non-permanent, and secure so that a malicious user cannot trap the transmitted data. You are asked to configure the Routing and Remote Access on the server so that the scientists can communicate with the server in a secure manner using dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up? Identify the DHCP server or NAS that is used to assign IP addresses to the remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. You are the system administrator at BlueMoon Computers. The organization is divided into various departments. All the departments are interconnected to each other using an internal network. The employees of the company need to use the internal network to send e-mails and access the Internet using Web browsers. The employees complain that they are unable to use the internal network to send e-mails and access the Internet through Web browsers. They also complain that they are unable to use other applications that use the internal network to transfer files from one computer to the other. Which layer of the OSl model should be checked to resolve the problem? Application Which RPvAS feature in Windows Server 2003 supports routing where one computer sends packets directly to one destination address? Unicast routing You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company complains about not being able to send mails and communicate with other computers over the network. To resolve the problem, you need to know the host names of the computers and the ports assigned to provide a particular service, which resource record should you view to get the desired information? Service Record (SRV) You are the system administrator at BlueMoon Computers. The internal network of the organization contains a DNS server to provide service to all other client computers. The company has undertaken many new projects. The employees working on the project complain that the network processing speed has become slow. The employees need to query the DNS database frequently to communicate with each other and to get the information they need related to their projects. Due to this increase in the time that the DNS server takes to give the results of the queries to the client computers, the projects are delayed. What should you do to let the projects be delivered in time?

Reduce the increased DNS network traffic by: Updating root hints on DNS server Configuring DNS server to use forwarder Clearing DNS server cache using DNS console You are the system administrator at Smartsoft2000. All the computers in the company are running Windows Server 2003 as their operating system. You have installed and configured network access services on the computers of accounts department. Some of the users of accounts department start complaining about connection failure and slow connection speed. Which utility should you use to resolve these problems? System Monitor and Performance Logs and Alerts Statement A: Nslookup command line utility enables you to troubleshoot DNS problems. Statement B: DNSLint is a third-party tool that enables you to troubleshoot DNS problems. Statement A is True and Statement B is False.

Identify the network in which a layer 2 switch is best suited.


A network

of 40 computers that has high level of data loss.

You are the system administrator at Red Sky inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server, in addition you should monitor the routing activities taking place during data transfer. How will you meet the requirements? Configure the network server to allow Routing and Remote Access Service. The head office of Machill, Inc has Implemented WINS for NetBIOS name resolution. As a system administrator of this organization, you have noticed a tremendous increase in the WINS traffic. The performance logs Indicate that the client renewal traffic is very high. Which of the following options will help you to counter this problem Increase the client renew interval You are a system administrator at Blue Sky inc. You decide to use IAS to centrally manage remote access to company's network. You maintain a centralized database of all user profiles that can be accessed by other remote access servers on the network. The company decides to expand its network to various cities, adding 5000 workstations

to the network. How will you justify that IAS is suitable for the new network configuration? IAS allows scalability of the network. You are the system administrator at Red Sky inc. the company's network consists of 500 systems with Windows Server 2003 servers. An authorized remote user can access the shared files available on servers. You are asked to keep track of network access activities using routing and remote access logging characteristics provided by RRAS. In addition, you are asked to perform the following activities: Maintain a detailed record of all remote access requests. Log names of remote access policies for all the connection attempts. You want to use the information available in the above logs for judicial enforcement of remote access policies. How will you meet the requirements? Configure the server to allow Local Authentication and Account logging. The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices? Distributed Consider the following statements: Statement A; Predefined iPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies. Both Statement A and Statement B are True. You are the system administrator at Blue Moon Inc. The company has a network of 250 computers, which are used by programmers to develop software. The programmers share sensitive data among themselves during software development. This data can be accessed by any unauthorized user outside the company network. You are asked by the management to reconfigure the DHCP server so that new IP addresses are assigned to the computers. After configuring DHCP server, you find that some computers do not get the new DHCP settings. How will you fix the problem? Use Ipconfig/release command to release the IP address, and then use Ipconfig /renew to renew the IP address. You are the system administrator of StarMoon Technologies. The head office of your organization is located at Boston. The organization has opened two branches in Paris and London. You have been assigned the task of planning the network infrastructure for

the new branches. After analysing the network requirements, you have implemented Ethernet network at the Paris branch and Token Ring network at the London branch. You need to transfer data between the branches using IP, IPX/SPX, RIP, or OSPF protocol. Depending on the requirements, which intermediate device would you recommend for the network? Router You are the system administrator at WorldAd, inc. The network has 50 computers, which are installed in an office. All the computers are running Windows Sever 2003 and configured to use NetBIOS naming function. The computers are configured as B-type nodes of NetBT protocol and use WINS IP addresses. The company decides to scale up the network to contain 5000 computers. After expansion of the network size all the employees complain about degraded network bandwidth. How will you fix the problem? Configure networks computers as P-node types and use a NetBIOS Name Server (NBNS) for naming function. You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems, which utility should you use to troubleshoot TCP/IP problems? Network Connections Repair Link You are the system administrator in Janes Technologies. Your organization has 400 computers in a mixed mode environment. The computers are running Windows 2000 and Windows Server 2003 on a local area network. The currently used connection method between the head office and branch office of the organization has been creating problems, such as slow network speed, terminated network connections, and low bandwidth, in addition, the organization has been incurring high cost for maintaining the currently used connection method. The management has asked you to change the connection method so that these problems can be resolved and the maintenance cost can be reduced. Which of the following connection methods should you use to fulfil the requirements of the organization? VPN You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options is the best possible strategy to accomplish this task? Create a server cluster that is based on single quorum device cluster model. The head office of your organization is located at New York. The organization now plans to open a new branch office at Las Vegas, which will be connected to the head office through WAN links. The new branch office is located in a building with three floors and will accommodate approximately 1000 hosts. Out of these 1000 hosts, 400 hosts belong

to the operational department and the remaining 600 hosts belong to the administration department. The network of this branch office will consist of computers running Windows Server 200B and Windows 2000 operating systems. As the system administrator, you need to create a TCP/IP plan for the new branch office, identify the most appropriate plan for the new branch office. You can use classless-based, class B addressing structure. In addition, you can have two subnets for the new branch office. Consider the following statements: Statement A: Forward lookup is used to resolve IP addresses to names. Statement B: Reverse lookup is used to resolve names to IP addresses. Both Statement A and Statement B are False. John is the system administrator at Technology Systems. The company has one DHCP server and 300 clients. John is responsible for assigning IP addresses to all the client computers. He uses DHCP service to assign IP addresses dynamically. He now wants to display the IP address of the DHCP server that responds to the DHCP request. Which field containing the DHCP settings should John use to implement the required task? DHCP Server You are the system administrator at Red Sky Corp. The company has a large network consisting of many subnetworks containing systems running Windows Server 2003. The subnetworks are used by the branch offices, which send latest production information to the head office. The company has decided to start a new branch office in New Jersey. You are asked to connect the subnetwork in the branch office with the main network so that the latest production information can be delivered to the head office. How will you configure the connection? Configure network routing by configuring RRAS, adding a routing protocol, and adding a routing interface. You are the system administrator at BlueMoon Computers. The internal network of the company contains primary and secondary DNS servers. The primary and secondary DNS servers contain information about different zones of the network. The data zone located on the primary zone changes. The change in the data zone should be updated in the secondary DNS servers also. You need to make the necessary updates to the secondary DNS servers. Which server should you look for the list of servers to be notified? Primary Server How many generic domains are present in the domain name space ? Seven

Which of the following functions is performed by IPSec? Authenticates client computers involved in communication Consider the following statements: Statement A: Predefined IPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies. Both Statement A and Statement B are True. Under which condition can a DNS Zone allow only secure dynamic updates? Zone is configured as an Active Directory-integrated zone. You are the system administrator of Janes Technologies. The head office of the organization is located at New York. The organization now plans to open a new branch office at Sydney and has assigned the task of planning the network setup of the new branch office to you. The management wants that the average utilization for the new branch office should be between 8096 to 9096. In addition, the peak throughput should be 9 Mbps. As a system administrator, you need to determine the best network connection type, assuming that the wire speed is 10 Mbps. Identify the most appropriate connection type for the network. Swtiched Ethernet You are the system administrator at BlueMoon Computers. The organization is divided into various departments. Ail the departments are interconnected to each other using an internal network. The employees of the company need to use the internal network to send e-mails and access the Internet using Web browsers. The employees complain that they are unable to use the internal network to send e-mails and access the Internet through Web browsers. They also complain that they are unable to use other applications that use the internal network to transfer files from one computer to the other. Which layer of the OSI model should be checked to resolve the problem? Application You are the system administrator at Red Sky Inc. The company has a network of Windows Server 2003 systems. A server, running Windows Server 2003, in the company's head office has a collection of class files. Classes need to be used by the software developers to develop software. Users connected to the network want to access the server as Web server. You are also required to implement authentication and authorization so that an unauthorized user cannot access the resources available on the server. In addition you should monitor the Configure the network server to allow Routing and Remote Access Service.

You are the system administrator of Janes Technologies. The organization has 1200 hosts that use a customized application. This application is required to be available 24X7 for all the employees of the organization. The downtime of this application can result in loss of business and effort. As a result, you need to plan for providing 24X7 availability of this application with minimal downtime. Which of the following options is the best possible strategy to accomplish this task? Create a server cluster that is based on single quorum device cluster model. You are the system administrator at BlueMoon Computers. The internal network of the company contains a primary DNS server and various secondary DNS servers. The internal network of the company is divided into various zones. The database administrator of the company wants to send and receive mails from the clients of the company. You want to find out whether a SMTP e-mail server is present on the network. Which resource record should you view to get the desired information? Mail Exchange (MX) You are a system administrator at Blue Sky Inc. You decide to use IAS to centrally manage remote access to company's network. You maintain a centralized database of all user profiles that can be accessed by other remote access servers on the network. The company decides to expand its network to various cities, adding 5000 workstations to the network. How will you justify that IAS is suitable for the new network configuration? IAS allows scalability of the network. You are the system administrator at Red Sky Inc. The company has a network of 3000 computers running Windows Server 2003 and using WINS type IP address. You decide to use NetBIOS name resolution on the network. To provide connectivity with TCP/IP networks, you configure the NetBT protocol on all the Windows Server 2003 computers. You set all the nodes as B-node type of NetBT protocol. After performing all these configuration changes, you notice that the network performance has suffered substantially. What can be the cause of the problem? Host computers configured as B-node on the network are creating an excessive broadcast traffic. You are the system administrator at BlueMoon Computers. There are 200 computers in the company. You need to configure four computers as DNS servers. The employees working on various projects in the company need to query the DNS server to get the data and information related to their project. The DNS server either provides the service to the client computers or redirects the queries to the Internet. Some employees complain about various viruses from Internet attacking their systems and diminishing their processing speed. What should you do to let the employees get rid of these viruses? Configure root hints to point to the local/internal servers, to prevent the DNS servers from redirecting the queries to the Internet.

Janes Technologies has its own DNS server to resolve the names within a domain, janestechnologies.com. The organization has opened anew branch office at Paris. You have joined as a system administrator in the Paris branch. You have been assigned the task of setting up the network of the branch office. To accomplish this, you have configured a computer running on Windows Server 2003 as a domain controller. However, you are not able to register the domain controller with the DNS server. Which of the following commands will enable you to troubleshoot this problem? Use the Nslookup command to check whether the new domain controller is resolving the parent domain controller. Consider the following statements: Statement A: You should disable the local subnet prioritization method when the servers having multiple IP addresses are not on the same subnet. Statement B: You should disable the round-robin rotation method when the servers having multiple IP addresses are on the same network. Both, Statement A and Statement B are False. Which of the following options is a storage method for networks that use SCSI parallel bus to connect multiple storage devices in a network? LUN masking John is the system administrator at Technology Systems. John configures the DHCP scopes. Which DHCP scope property should he configure to specify the time period for which DHCP server will assign IP addresses? Lease duration You are the system administrator at BlueMoon Computers. You have established the internal network of the company, which connects all the computers. You assign host names and NetBIOS names to the computers on the network. Different applications run on different computers. An application running on a computer needs to communicate with another computer on the network to request for some information. The application sends a host name to the DNS client service. The following steps are performed: DNS server sends the request to the NetBIOS name resolution process. DNS client service seeks the required host name in the client resolver cache. DNS client service seeks the host name query to the DNS server. The corresponding IP address is returned to the application on success. What is the correct sequence of steps that is followed when the DNS client service resolves the host name to the corresponding IP address?

2,3,1,4 You are the system administrator at BlueMoon Computers. The DHCP server of the internal network controls hundreds of computers connected to each other and with the server. The DHCP server contains a lot of data. The server is has very less memory space left. The Managing Director asks you to attend a meeting with the board of directors about configuring the internal network of some new offices that have opened recently. When you come back after the meeting, you find that the server has run out of memory space. You want to check the transactions that were done on the DHCP database after you left for the meeting. How can you get the desired information? Check the Resl .log file to find out the various transactions in the DHCP database transactions. How does smart card log on work? By verifying the users identity during log on You are the system administrator at Safest Software Co. You are monitoring the network, which includes tracking and troubleshooting network problems. Which utility should you use to troubleshoot TCP/IP problems? Network Connections Repair Link You have joined BlueMoon Computers as a system administrator. The internal network of the company is divided into various zones. The internal network has a primary DNS server and various secondary NS servers to manage different zones of the network. The company has undertaken a new project. The team members of the project need to communicate with each other using the names corresponding to the role they are assigned in the project. So, you need to change the host names of computers used by these employees. Which record source do you use to rename the computers? Alias (CIS)AME)

Which RRAS feature in Windows Server 2003 supports routing to bring up temporary connections? Demand-dial routing Statement A: A forwarder resolves the names that the DNS servers forward to it. Statement B; A forwarder redirects the queries to the root server of the external network to resolve the queries. Statement A is False and Statement B is True.

Redzone, Inc. has a namespace, redzone.com. One of the DNS servers, DNS01 has some confidential data and the organization does not want any external users or computers to access the DNS namespace of the DNS server, DNS01. As a result, you, as the system administrator, want to segregate the DNS namespace of the DNS server, DNS01 from other DNS servers of the organization. Which of the following type of internal namespace is required that has minimal impact on the existing namespace? Unique You are the system administrator of StarMoon Technologies. The head office of the organization is located at Boston. The organization has opened two branches at Paris and London and implemented Ethernet network at both the branch offices. You have planned for network connectivity between the head office and the branch offices through the Internet. You need to plan for an intermediate device that connects the Internet with your organization's network. Which of the following devices will enable you to accomplish this task? Router You are the system administrator at Modern Research Inc. The company is a research organization that manages a community of res scientists from various universities across the globe. The cc has its head office in Atlanta and all the scientists working < project submit their thesis at the head office for publishing, scientist at the remote location needs to establish a conned the Windows Server 2003 server in head office using dialup connection should be physical, non-permanent, and secure malicious user cannot trap the transmitted data. You are ask configure the Routing and Remote Access on the server so t scientists can communicate with the server in a secure mani dial-up. What configuration information will you take into consideration while configuring the Remote Access Server for dial-up? Identify the DHCP server or NAS that is used to assign IP addresses to remote clients. Identify RADIUS server or NAS that needs to be configured for authenticating the connection request from dial-up clients. Verify that user accounts are configured with access properties to permit dial-up access. You are the system administrator of Denver Prime, Inc. The organization has a DNS namespace, www.denverprime.com. Some employees of the organization have been sent to London on a project for six months. These employees need to access the organization's domain using the www.denverprime.com namespace. As these employees access this domain namespace through the Internet, you need to ensure security of the organization's domain. What should you do to ensure that the organization's domain is secure? Apply high-level security on the DNS server.

James is the system administrator at Red Sky IT Systems. James is responsible for maintaining a record of IP addresses of all the computers of the research department. The junior system administrator has assigned IP addresses manually to the computers

of research department, james now wants to verify the assigned IP addresses to maintain his record. Which utility should James use to implement the given task? Ipconfig James is the system administrator at Smart Software Development. The company is having remote network access between the computers of branch office and head office. James needs to monitor the network access servers through various objects. These objects contain information about the remote network access requests, errors, protocols, and performance data. Which object should James use to monitor the performance of individual remote access ports? RAS Port Techno, Inc. has its head office at Chicago. This organization has two branch offices located at London and Los Angeles. Each location has a network setup in mixed mode with 10 computers running on Windows Server 2003 and 200 computers running on Windows XP. The head office and each branch office have a Windows Server 2003 computer that is configured as a WINS server. You are the system administrator of the organization and you want the WINS data in the network to be consistent throughout the network. In addition, you want that all computers in the network should be able to access each other by name. Which of the following options will enable you to accomplish these objectives? Configure push/pull replication partnerships among all WINS servers.

You are the system administrator of Red Sky Corp. The domain in the company network has two Windows Server 2003 member server computers named Server 1 and Server 2. Routing and Remote Access Service is enabled for remote access on Server 2. IAS is installed on Server 1. Server 2 uses Server 1 to authenticate remote access credentials. The remote access policies on Server 1 specify that domain members are allowed remote access to the network. However, users report that they are not allowed to dial in to Server 2. You need to identify the cause of the problem and suggest a solution to resolve the problem. How will you accomplish the task? Server 1 is configured to support only local user accounts. Add Server 1 to the RAS and IAS Servers group in Active Directory to resolve the problem. Statement A: Domain names represent user-friendly alphanumeric names that refer to computers on the Internet. Statement B: The multihomed NetBIOS name registers a unique NetBIOS name that has more than one IP address in the WINS database. Both Statement A and Statement B are True.

You are the system administrator at Blue Moon Computers. The internal network of Blue Moon Computers maintains multiple WINS. The WINS database contains many WINS client names that are no longer in use. It has become difficult for you to manage the WINS client names and retrieve information from the WINS database. When the WINS database is replicated from one WINS server to the other, all the unused names are also replicated. You want to specify the time required by WINS server to verify the active names that are replicated from other WINS servers. Which parameter should you use to accomplish this task? Verification interval Your organization has acquired a new business contract and has assigned a team of five employees to work on this contract. As this team works on confidential data, you do not want Internet-name resolution for this team. You have installed anew DNS server for this team. In addition, you do not want any client queries to be forwarded to this new DNS server. You also do not want other employees of the organization to use this DNS server internal name resolution. Which of the following options enables you to accomplish this task? Delete root hints file on DNS server. You are the system administrator in Best Computers, Inc., with its head office at New York. The organization has 15 branches across USA, with total number of employees being 8000. The organization now plans to open up 4 new branch offices in Europe with each branch office having 1000-1200 hosts. In addition, each new branch office will be a separate network that will be connected to the main organization's network through VPN and leased lines. As a system administrator, you need to plan the TCP/IP addressing structure for the new branch offices according to the current infrastructure of the organization. Identify the most appropriate addressing structure for the new branch offices. Classless-based, class B addressing structure As the system administrator of Red Sky IT Systems, you have implemented VPN for secure and cost effective data transfer across the branch offices. You want to ensure that the incoming and outgoing data communication through VPN should be secure. Which of the following options will enable you to accomplish this task? Set the tunnel endpoints for the VPN tunnel in the Edit Rule Properties dialog box to secure both the incoming and the outgoing network traffic. An organization has its head office at Denver and two branch offices at Virginia and New York. Each branch including the head offices has implemented NLB clusters. You, as a system administrator, need to monitor the NLB cluster of the New York branch from the head office. Which of the following commands will enable you to perform this task? Nlb.exe

You are the system administrator at Red Sky Corp. The company has a large network consisting of many subnetworks containing systems running Windows Server 2003. The subnetworks are used by the branch offices, which send latest production information to the head office. The company has decided to start a new branch office in New Jersey. You are asked to connect the subnetwork in the branch office with the main network so that the latest production information can be delivered to the head office. How will you configure the connection? Configure network routing by configuring RRAS, adding a routing protocol, and adding a routing interface. You are the system administrator of Prix, Inc. The top management of your organization has decided that all employees are required to daily log in their time sheet in the time tracking database. For this employees would be using the domain name www.prix.com. The employees working remotely at the client site also need to log in their time sheet in the database daily. To do this, the employees operating remotely need access to the www.phx.com domain of the organization. You anticipate that this process would take maximum 20 minutes. How you can accomplish this task considering the feasibility of the solution? You should implement Dial-up to enable remote employees to log on to the network. This is because the employees located remotely require network access for just 20 minutes. You are a System administrator at Red Sky Corp. You are asked to Implement a security policy on the company network. You Implement the security policy configuring MSCHAP authentication on RRAS. John Is an employee In the company and has remote access rights as specified In the access policies for the network. You need to modify the parameters In the policy profile so that a user cannot change the account password later. How will you meet the requirements by configuring a parameter In policy profile? C Configure Authentication parameter. StarMoon Technologies has its head office at Boston. The network of the head office consists of 200 computers running Windows Server 2003. The branch office of the organization is located at Texas City. The network ofthe branch office consists of 100 computers running Windows NT computers. The head office and the branch office are connected through slow WAN links. Select the best-suited name resolution strategy for resolving host names for the organization. C Plan for one DNS server at the head office and one WINS server at the branch office. You are the system administrator in Best Computers, Inc., with its head office at New York. The organization has 15 branches across USA, with total number of employees being 8000. The organization now plans to open up 4 new branch offices in Europe with each branch office having 1000-1200 hosts, in addition, each new branch office will be a separate network that will be connected to the main organization's network through VPN and leased lines. As a system administrator, you need to plan the TCP IP addressing structure for the new branch offices according to the current infrastructure of the

organization, identify the most appropriate addressing structure for the new branch offices. Class-based, class A addressing structure Consider the following statements: Statement A; Predefined iPSec polices are directly used or assigned as a security template for defining custom IPSec policies. Statement B: Predefined IPSec policies can be modified according to security requirements to create customized IPSec policies. Both Statement A and Statement B are True. You are the system administrator at BlueMoon Computers. The organization is divided into various departments. All the departments are interconnected to each other using an internal network. The employees of the company need to use the internal network to send e-mails and access the Internet using Web browsers. The employees complain that they are unable to use the internal network to send e-mails and access the Internet through Web browsers. They also complain that they are unable to use other applications that use the internal network to transfer files from one computer to the other. Which layer of the OSl model should be checked to resolve the problem? Application Statement A: The caching-only servers are non-authoritative servers that contain Information regarding frequently requested domain names and IP addresses associated with each domain name. Statement B: The information contained in the caching-only server is used only to quickly answer queries from other DNS servers. C Statement A is True and Statement B is False. The head office of Matrix, Inc. is located at Paris. The organization plans to open two new branch offices at Atlanta and London. The organization needs to automate the assignment of IP addresses to the computers in these branch offices. The branch offices are connected to the head office by slow WAN links. What kind of DHCP infrastructure strategy you will plan for the new branch offices? Distributed Statement A: A NetBIOS computer with name Computer! [OOh] provides workstation services. Statement B: A NetBIOS computer with name Computer2 [03h] provides messenger services.

Both Statement A and Statement B are True.